Here's a link to today's AI slop #curl #hackerone report. Freshly disclosed: https://hackerone.com/reports/2887487
The #curl CVE we will publish on Wednesday addresses an issue that has existed in source code for almost twenty-five years.
severity low though, so the sky might not fall this week either
I published an Advanced Persistent Threat (APT) profile on Gamaredon, a Russian state-sponsored cyberespionage group. Gamaredon (Group) is also known as Aqua Blizzard/ACTINIUM, and BlueAlpha, but most vendors do refer to them as Gamaredon. In 2021, they were publicly attributed by the Security Service of Ukraine (SSU) to Russia's Federal Security Service (FSB) Centers 16 and 18.
#gamaredon #russia #cyberespionage #fsb #bluealpha #aquablizzard #infosec #cybersecurity #cyberthreatintelligence #CTI #threatintel
Mandiant's Thibault Van Geluwe de Berlaere demonstrates a novel technique that can be used to circumvent all three current types of browser isolation (remote, on-premises, and local) for the purpose of controlling a malicious implant via C2. https://cloud.google.com/blog/topics/threat-intelligence/c2-browser-isolation-environments/
itch.io is reporting on bsky that their domain has been taken down due to ...well.
Lies, damned lies, and photodiodes: https://lcamtuf.substack.com/p/lies-damned-lies-and-photodiodes
New episode is up!
https://unnamedre.com/episode/72
I was surprised to receive an email from Amazon that indicated that two items in my wishlist were shipped. I mean... I only expressed the desire to maybe purchase them in the future, right?
As it turns out, that email you read in Gmail isn't the email from Amazon. It's a summary of what Gmail thinks Amazon emailed you about. You have to scroll down to see the actual email that they sent. Amazon stopped emailing you what's being shipped to you a long time ago, anyway.
play the grindr notification noise at Christmas dinner to see which conservative relatives panickedly check their phone ringer
are you a programmer? do you like heavy metal? would you like to be *really upset* by a music video?
do i have something for you.
Tell you a secret about red team #cybersecurity work:
Almost everyone wants to pretend to be a red teamer; almost nobody had the willingness to put in the real work to become one.
Responsible Red Teaming is @thetaggartinstitute 's most enrolled course by a wide margin.
It is also the least-completed.
The course content is not more technical than any other offensive security course. Indeed, most of it is far less, instead requiring you to think about the human impact of the work. This course discusses how to operate in a safe, appropriate manner. It is not about popping shells.
Once most folks discover this, they bail.
If you want to do offensive security solely because you want to "hack stuff," you're a liability. You must understand your role in hardening defenses and working with defenders to improve operational security.
The job is not a CTF. If you can't hack that, please find another line of work.
Stop. Truncating. Hashes.
https://www.phoronix.com/news/OpenWrt-Compromised-ASU-Builds
As a service to security researcher, I added this section to #curl's hackerone page:
AI
If you have used AI in the creation of the vulnerability report, you must disclose this fact in the report and you should do so clearly. We will of course doubt all "facts" and claims in reports where an AI has been involved. You should check and double-check all facts and claims any AI told you before you pass on such reports to us. You are normally much better off avoiding AI.